On Sat, Apr 18, 2009 at 7:31 PM, Charles Forsyth <fors...@terzarima.net> wrote: > this discussion of checkpoint/restart reminds me of > a hint i was given years ago: if you wanted to break into a system, > attack through the checkpoint/restart system. i won a jug of > beer for my subsequent successful attack which involved patching > the disc offset for an open file in a copy of the Slave Service Area saved > by the checkpoint; with the offset patched to zero, the newly restored process > could read the file and dump the users and passwords conveniently stored in > the clear at > the start of the system area of the system disc. the hard bit was > writing the code to dump the data in a tidy way. > >
Unfortunately, in the rush to build the Next Cool Thing people often leave security issues to the very end, at which point shoehorning fixes in gets ugly.